1 / 40

Internet Security CSCE 813 Application Layer Security

This text discusses the communication between layers in the TCP/IP protocol stack and the application layer security. It explores the advantages and disadvantages of application layer security, authentication and key distribution methods, and the Kerberos protocol.

danielv
Download Presentation

Internet Security CSCE 813 Application Layer Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Internet SecurityCSCE 813Application Layer Security

  2. TCP/IP Protocol Stack Application Layer Transport Layer Internetwork Layer Network Access Layer CSCE 813 - Farkas

  3. Communication Between Layers Application Data Application layer Application layer Transport payload Transport layer Transport layer Network Payload Network layer Network layer Network layer Network layer Data Link layer Data Link layer Data Link layer Data Link layer Data Link Payload Host A Router Router Host B CSCE 813 - Farkas

  4. Application Layer • Provides services for an application to send and recieve data over the network, e.g., telnet (port 23), mail (port 25), finger (port 79) • Interface to the transport layer • Operating system dependent • Socket interface CSCE 813 - Farkas

  5. Application Layer Security • Advantages: • Most flexible • Executing in the context of the user easy access to user’s credentials • Complete access to data easier to ensure nonrepudation and small security granularity • Application-basedsecurity • Disadvantages: • Most intrusive • Implemented in end hosts • Need for each application  • Expensive • Greated probability of making mistake CSCE 813 - Farkas

  6. Providing Security • Provide security system that can be used by different applications • Develop authentication and key distribution models • Enhance application protocol with security features • Need to enhance each application CSCE 813 - Farkas

  7. Authentication and Key Distribution • Kerberos (MIT) and its extensions (Secure European System for Application in a Multi-vendor Environment (SESAME)) • Network Security Program (IBM) • SPX (Digital Equipment Corporation) • The Exponential Security System (University of Karlsruhe) CSCE 813 - Farkas

  8. Kerberos Threats • User gains access to workstation and pretends to be another user operating from that workstation • User may alter the network address of a workstation so that the requests form the altered workstation appear to come from the impersonated workstation. • User may eavesdrop on exchanges and use a replay attack to gain access to a server or to disrupt operation. CSCE 813 - Farkas

  9. Requirements • Secure • Reliable • Transparent • Scalable • Trusted Third Party authentication service • Based on Needham-Schroeder (1978) protocol CSCE 813 - Farkas

  10. Kerberos Components • Key Distribution Center (KDC) • Authentication server (AS) • Ticket-granting server (TGS) • Database: users’ identifiers + secret kay shared between KDC and user • Need physical security CSCE 813 - Farkas

  11. Ticketing System • KDC issues tickets that clients and servers can use to mutually authenticate themselves and agree on shared secrets. • Ticket: • Session key • Name of principal • Expiration time • Ticket types: • Ticket-granting ticket: issued by AS and used between client and TGS • Service ticket: issued by TGS and used between client and server CSCE 813 - Farkas

  12. Kerberos Kerberos 1.Request ticket- granting ticket Once per user logon session 2. Ticket + session key KDC Client 3. Request service- granting ticket TGS Once per type of service 4. Ticket + session key 6. Provide server authentication 5. Request service Server Once per service session CSCE 813 - Farkas

  13. Kerberos Versions • Version 4 (MIT) – 1992 • Versions 1-3 were only used at MIT • Shortcomings and limited functionality (S. Bellovin and M. Merrit 1990) • Version 5 (RFC 1510) – 1993 • Improves on version 4 shortcomings CSCE 813 - Farkas

  14. Version 4 limitations • Environmental shortcomings • Encryption system dependence • Internet protocol dependence • Message byte ordering • Ticket lifetime • Authentication forwarding • Inter-realm authentication • Technical deficiencies • Double encryption • PCBC encryption • Session keys • Password attack CSCE 813 - Farkas

  15. Security-Enhanced Application Protocol • Applications: • Terminal access • File transfer • Electronic mail • WWW transactions • DNS • Distributed file system CSCE 813 - Farkas

  16. Terminal Access • Protocols running on top of TCP/IP • Telnet: password based authentication • Rlogin: address-based authentication • Security enhanced Telnet • Kerberos-mediated Telnet encryption: difficult to achieve • Security-enhanced Telnet (e.g., Secure Telnet (STEL) Univ. Milan • Authentication enforced by STEL is stronger than Telnet • All data traffic is encrypted between client and server • Secure Shell (SSH) CSCE 813 - Farkas

  17. SSH • Provides similar services than SSL • Mutual authentication • Encrypted sessions between two endpoints • Most often used to replace traditional terminal access  Application layer security • Any application running on top of TCP can be secured by SSH CSCE 813 - Farkas

  18. SSH versions • SSH v1 • Tatu Ylonen, Helsinki University of Technology, Finland • Implementation, source code, documentation, configuration scripts: public and freely available • Widespread use • SSH v2 • Specified by IETF Secure Shell WG (1st draft: 1997) • Widespread use • Open source implementations: OpenSSH CSCE 813 - Farkas

  19. SSH • Both version use generic transport layer security protocol over TCP/IP • Support for • Host and user authentication • Data compression • Data confidentiality • Integrity protection • Server listens for TCP connection on port 22, assigned to SSH CSCE 813 - Farkas

  20. SSH v1 keys • Host public key pair • Bind connection to the desired server host • Long-term • Long key size (typically 1,024 bit RSA) • Server public key pair • Provide confidentiality • Short-term • Short key size (typically 768 bit RSA) • Changes periodically (i.e., every hour by default) • For PFS server’s private key cannot be saved on disk CSCE 813 - Farkas

  21. SSH Session • Client  Server: Authentication request • Server  Client: Server public keys (long-term and short-term) • Client: • Compares received keys to its database of pre-distributed keys and (usually) accepts keys • Generates 256-bit random session key • Chooses encrypting algorithm • Pads session key • Double encrypts session key with server and host public keys CSCE 813 - Farkas

  22. SSH Session • Client  Server: Sends double encrypted session key • Server: • Decrypts session key • Server  Client: send confirmation encrypted by session key Both parties use session key to encrypt traffic between server and client CSCE 813 - Farkas

  23. Authentication • After session key agreement, client assumes that the server is authenticated • If user authentication is required: • Password authentication • RSA authentication (server need to know the user’s public key) CSCE 813 - Farkas

  24. Electronic Mail Security

  25. Electronic Mail • Most heavily used network-based application • Used across different architectures and platforms • Send e-mail to others connected directly or indirectly to the Internet regardless of host operating systems and communication protocols • NEED: • Authentication • Confidentiality CSCE 813 - Farkas

  26. Secure E-mail Approaches • PGP: Pretty good Privacy • PEM: Privacy-Enhanced Mail • Secure Multipurpose Internet Mail Extensions (S/MIME) CSCE 813 - Farkas

  27. Pretty Good Privacy • Phil Zimmermann • Confidentiality and authentication for • Electronic mail and • Storage applications CSCE 813 - Farkas

  28. PGP – Evolution • Choose best available cryptographic algorithms • Integrate these algorithms such that • Independent of operating system and processor • Based on a small set of commands • Make the application and the documentation available through the Internet • Create an agreement with a company to provide compatible, low-cost commercial version of PGP CSCE 813 - Farkas

  29. PGP - Usage PGP became widely used within a few years • Available worldwide for different platforms • Based on proven secure algorithms (RSA, IDEA, MD5) • Wide range of applicability • Was not developed or controlled by government standards CSCE 813 - Farkas

  30. Why PGP? • Protect privacy • “I don’t need encryption!” = “I don’t need privacy.” • Interception transmission to destinations • Transparent mailbox (dial-up connection) • You may not but other party may want privacy • Commercial privacy • Customer’s data • Company data • User’s profiling • Signed messages • Authentication • Integrity ? CSCE 813 - Farkas

  31. PGP Services • Digital Signature: RSA, MD5 • Hash code of message is created using MD5, encrypted using RSA, with sender’s private key, and attached to the message • Confidentiality: RSA, IDEA • Message is encrypted using IDEA, with one-time session key generated by the sender, session key is encrypted, using RSA and the recipient’s public key, and attached to the message CSCE 813 - Farkas

  32. PGP Services • Compression: ZIP • Message may be compressed for storage or transmission • E-mail compatibility: Radix 64 conversion • Encrypted message is converted to ACSII string • Segmentation • To accommodate maximum message size, PGP performs segmentation and reassembly CSCE 813 - Farkas

  33. Authentication KAprivate H(M) KAprivate[H(M)] E H H M M c Compare M D concatenate KAprivate[H(M)] KApublic Receiver B Sender A CSCE 813 - Farkas

  34. Authentication • RSA and MD5: effective digital signature schema • Default: signatures attached to messages • Support detached signatures • User may want to maintain separate signature files • Detect virus infection of executable programs • Support multiple signature of a message CSCE 813 - Farkas

  35. Confidentiality Ksession Ksession(M) Ksession(M) E M E M concatenate c E Ksession KBpublic (Ksession) D Ksession KBpublic (Ksession) KBpublic KBprivate Receiver B Sender A CSCE 813 - Farkas

  36. Confidentiality • IDEA: secret-key encryption • Key-distribution: • randomly generated, one-time session keys • Encrypted by receiver’s public key • Attached to the message • Double encryption • IDEA • One-time key • RSA key size: • Casual: 384 bits • Commercial: 512 bits • Military: 1024 bits CSCE 813 - Farkas

  37. Confidentiality and Authentication Sender A KAprivate Ks[M+H(M)] KBpublic Ks E M H E M E c c KAprivate[H(M)] KBpublic (Ks) H Compare D D Ks D KBprivate KApublic Receiver B CSCE 813 - Farkas

  38. Compression • Usually after signature and before encryption • Preferable to sign uncompressed message -> store them together for future verification • PGP’s compression algorithm is not deterministic • Encryption after compression strengthen cryptographic security (less redundancy) CSCE 813 - Farkas

  39. E-mail Compatibility • PGP encryption: arbitrary 8-bit binary stream • Several e-mail system: ASCII text • PGP: converts the binary stream to a stream of printable ASCII characters • Expands the message by 33% • Converts everything, regardless of content (even ASCII characters) CSCE 813 - Farkas

  40. Segmentation and Reassembly • E-mail: restriction on maximum message length • Long messages broken into segments • Segments are mailed separately • PGP automatically divides a long message • Segmentation is done after all other processing • Receiving PGP reassembles the original message CSCE 813 - Farkas

More Related